Solved

Tcp sequencing and IP fragmentation

Posted on 2004-09-06
6
952 Views
Last Modified: 2013-11-29
I know TCP segments are numbered (with sequence numbers) for reassembly/error recovery reasons.  
How do TCP segments and IP fragmentation correlate?  If the sender has an IP datagram that exceeds the layer 2's MTU, it fragments the datagrams and each datagram gets sent as separate frames across the wire.

Now, what is responsible for reassembly on the other end?   I know that with packet fragmentation, a packet id is defined and the "fragment" flag is turned on.  What is TCP's job in the reassembly of fragged IP datagrams?  Arent the fragmented packets ID'd anyway?
Thanks
0
Comment
Question by:dissolved
  • 3
  • 3
6 Comments
 
LVL 7

Accepted Solution

by:
LimeSMJ earned 500 total points
ID: 11991697
The Internet layer (IP protocol) within the TCP/IP architecture is responsible for reassmebly of a fragmented packet.

If a packet hits a network where the MTU is lower than the originator, the packet is fragmented to allow for transmission.  The fragmentation is done usually by the routers along the way so the sender does not know of the packet manipulation (sender won't decrease packet size if MTU is smaller).  Since the sender is only sending sequenced packet numbers (not caring about fragmentation), the fragmented packets need to have their own sequencing flags added in by the router - so that the IP layer can defragment at the receiving end.

TCP's job is provide the transmission link... IP helps negotiate the data packets along the way.




0
 

Author Comment

by:dissolved
ID: 11991843
Cant fragmentation occur between the network layer and data link layer as well?
I heard that if an IP datagram is handed to the data link layer, it will be fragmented if it is to big. And each packet leaving the network will have the fragment flag turned on.

0
 

Author Comment

by:dissolved
ID: 11991850
Also, cant the receiver send a ICMP error back to the sender saying "needs fragmentation" or something like that?
0
VMware Disaster Recovery and Data Protection

In this expert guide, you’ll learn about the components of a Modern Data Center. You will use cases for the value-added capabilities of Veeam®, including combining backup and replication for VMware disaster recovery and using replication for data center migration.

 
LVL 7

Expert Comment

by:LimeSMJ
ID: 11992029
The ICMP request for fragmentation is generated by a router if the packet received has the "do not fragment" bit set and cannot be forwarded because the next hop MTU is too small for the packet (fragmenting is not possible to make the MTU smaller, so this error occurs).  The actual destination computer would never send an ICMP request for fragmentation.
0
 
LVL 7

Expert Comment

by:LimeSMJ
ID: 11992101
I am not sure what you meant by :

"...IP datagram is handed to the data link layer, it will be fragmented if it is to big..."

The IP datagram is the packet itself... the sent payload.  If the sending computer knows of potential MTU problems, it may allow the packet to be fragmented (thus preventing any transmission delays).  Unless there is a stack misconfiguration, there is no way for a datagram to be internally fragmented between the OSI layers.
0
 

Author Comment

by:dissolved
ID: 11992105
thanks
0

Featured Post

Easy, flexible multimedia distribution & control

Coming soon!  Ideal for large-scale A/V applications, ATEN's VM3200 Modular Matrix Switch is an all-in-one solution that simplifies video wall integration. Easily customize display layouts to see what you want, how you want it in 4k.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Don’t let your business fall victim to the coming apocalypse – use our Survival Guide for the Fax Apocalypse to identify the risks and signs of zombie fax activities at your business.
If you're not part of the solution, you're part of the problem.   Tips on how to secure IoT devices, even the dumbest ones, so they can't be used as part of a DDoS botnet.  Use PRTG Network Monitor as one of the building blocks, to detect unusual…
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

860 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question